Files
hayabusa/rules/Sigma/win_process_creation_bitsadmin_download.yml
2021-11-14 11:00:56 +09:00

49 lines
1.3 KiB
YAML

title: Bitsadmin Download
author: Michael Haag, FPT.EagleEye
date: 2017/03/09
description: Detects usage of bitsadmin downloading a file
detection:
SELECTION_1:
EventID: 1
SELECTION_2:
EventID: 1
SELECTION_3:
Image: '*\bitsadmin.exe'
SELECTION_4:
CommandLine: '* /create *'
SELECTION_5:
CommandLine: '* /addfile *'
SELECTION_6:
CommandLine: '*http*'
SELECTION_7:
CommandLine: '* /transfer *'
SELECTION_8:
CommandLine: '*copy bitsadmin.exe*'
condition: (SELECTION_1 and ((SELECTION_2 and (SELECTION_3) and (((SELECTION_4
or SELECTION_5) and (SELECTION_6)) or (SELECTION_7))) or (SELECTION_8)))
falsepositives:
- Some legitimate apps use this, but limited.
fields:
- CommandLine
- ParentCommandLine
id: d059842b-6b9d-4ed1-b5c3-5b89143c6ede
level: medium
logsource:
category: process_creation
product: windows
modified: 2021/07/16
references:
- https://blog.netspi.com/15-ways-to-download-a-file/#bitsadmin
- https://isc.sans.edu/diary/22264
- https://lolbas-project.github.io/lolbas/Binaries/Bitsadmin/
status: experimental
tags:
- attack.defense_evasion
- attack.persistence
- attack.t1197
- attack.s0190
- attack.t1036.003
yml_filename: win_process_creation_bitsadmin_download.yml
yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/process_creation